Serious Cryptography: A Practical Introduction to Modern EncryptionNo Starch Press, 6.11.2017 г. - 312 страници This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questions Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. |
Съдържание
Encryption | 1 |
The OneTime Pad | 7 |
Asymmetric Encryption | 15 |
Randomness | 21 |
Cryptographic Security | 39 |
Choosing and Evaluating Security Levels | 44 |
Protecting Keys | 50 |
Block Ciphers | 53 |
Hard Problems | 163 |
Complexity Classes | 168 |
The Discrete Logarithm Problem | 174 |
RSA | 181 |
Signing with RSA | 188 |
How Things Can Go Wrong | 196 |
DiffieHellman | 201 |
The DiffieHellman Function | 202 |
How to Construct Block Ciphers | 55 |
Implementing | 62 |
Further Reading | 75 |
Stream Ciphers | 77 |
SoftwareOriented Stream Ciphers | 91 |
How Things Can Go Wrong | 100 |
Hash Functions | 105 |
Secure Hash Functions | 106 |
Keyed Hashing | 127 |
Authenticated Encryption | 145 |
The Authenticated Cipher Standard | 152 |
An Authenticated Cipher Faster than GCM | 155 |
9 | 162 |
DiffieHellman Protocols | 209 |
Further Reading | 216 |
Elliptic Curves | 217 |
DiffieHellman Key Agreement over Elliptic Curves | 225 |
Further Reading | 233 |
TLS | 235 |
Quantum and PostQuantum | 251 |
Quantum SpeedUp | 257 |
271 | |
272 | |
279 | |
Други издания - Преглед на всички
Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson Ограничен достъп - 2017 |
Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson Ограничен достъп - 2017 |
Често срещани думи и фрази
32-bit words AES-GCM Alice Alice and Bob associated data attack authenticated cipher authentication tag block cipher bytes C₁ called certificate Chapter ciphertext block client CMAC collision complexity compression function crypto decrypt Diffie-Hellman discrete logarithm ECDSA elliptic curve elliptic curve cryptography encryption entropy equation example exponential factoring faster GHASH hard hash function hash value HMAC implementation input insecure integers key agreement protocol keystream length LFSR M₁ M₂ mode modulo multiple NIST nonce NP-complete OpenSSL operations output padding parameters permutation Pick a random plaintext plaintext block points polynomial post-quantum preimage prime number private key PRNG pseudorandom public key quantum computer quantum gates qubits rounds Salsa20 secret key security level server shared secret Shor's algorithm shown in Figure signature scheme solve stream ciphers string there's tion universal hash verify